Security fundamentals: File integrity monitoring

The majority of security practitioners agree that establishing foundational security controls will give agencies the biggest security bang for their buck. So where should those agencies focus their efforts in order to ensure a strong foundation of security?

There are four key principles at the heart of every effective security foundation: log management, file integrity monitoring, policy compliance and vulnerability management. This second of a four-part series addresses file integrity monitoring (FIM).

Download to Learn More!


Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.